Ten Ways Evolving Technology Affects Cybersecurity

posted one year ago

The ever-evolving digital age affects cybersecurity more than most people realize. The rate of cybercrimes has grown exponentially and is consistent with the growth of technology. As technology expands and develops, so do the cybercrimes that are committed. Fortunately, as technology has advanced, so has the ability to seek out cybercrimes before they happen and protect people when they occur.

Here are ten ways developing technology has changed cybersecurity:

1. Corporate Security Breaches

The majority of these corporate security breaches occur when hackers exploit employees through social engineering and scams. With advancements in technology, hackers are becoming more skilled at finding holes and cracks in corporate security systems and can gain access to protected files and data, posing a significant cybersecurity threat. Unfortunately, 2012 may be a record year for corporate security breaches.

2. Spear Phishing

Unlike regular phishing emails that target random people, culprits who normally lead spear phishing scams are seeking information for monetary gain; business secrets or private information. Spear phishing occurs when hackers target employees through emails that appear to be from colleagues within their own organizations, allowing cyber criminals to steal personal information. With the progressive technology available today, hackers are able to send emails to employees disguised as others within the company – making this a substantial cybersecurity risk.

3. Identity Fraud

Cyber criminals are increasingly using social media to engage in identity theft schemes, and entice individuals to download malicious codes or reveal passwords. Experienced hackers can easily hack into users social media accounts and later use that information to venture into your personal email account, work email account and banking information.

The average user shares a lot of information on social media sites; most reveal a person’s name, age, birthday, hometown and family members, while others can go as far as revealing addresses, phone numbers and even up to the minute location updates. Some of this information can reveal just enough for a hacker to find the opportunity and steal your identity online.

4. Social Media Security Breaches

Not only do social media sites give hackers access to personal information, some sites can also share your exact whereabouts at any point in time. And if someone knows where you are – they also know where you are not. For instance, the social media network Foursquare allows users to “check in” to the places they visit such as school, work, restaurants or even the movie theater. Any number of people can easily tell where you are, and at what time of day by logging into the social network and looking at your profile. The indicator that you are away from home base can put your valuables and safety at risk.

5. Mobile Security Breaches

As mobile technology is continuously emerging, so are mobile cybersecurity threats. Currently, 45 percent of cell phone owners have smartphones, which hold more data than the older alternative models. Every new phone, tablet and mobile device serves as an additional opportunity for a cyber attacker to gain access to someone’s personal data. As many mobile devices can be plugged into computers to be charged, sharing charging ports with others can create malware issues for many different devises.

6. Data has Gone Digital

Hard copy information is increasingly less common – practically everything is digital these days. Though often protected by a password, most information is stored on a shared network. As a result, a hacker could gain access to the network and obtain valuable information that could put individuals or businesses at risk.

7. Cloud Computing

As more businesses shift to cloud computing and save documents and information to cloud networks poses an additional cybersecurity risk. This method is attractive option to many businesses, as cloud computing and storage is extremely efficient and cost effective. However, certain sophisticated security measures must be put into place to protect information on the cloud. While this technology is continuously emerging, it is crucial for companies to implement security precautions to combat the evolving trends.

8. Advanced Employee Training

As previously noted, with the expanding smartphone market, people are becoming more technologically savvy and need to be educated as technology develops. Proper training should be employed so that the company’s workforce understands the cybersecurity threats, and how to avoid them. Consequently, employees can use this knowledge to get information from their employers from databases, the cloud or on company-shared servers.

9. Hacktivism

In 2012 there have been a few instances of hacktivism – the act of hacking for a political or social reason. Hackers are taking the practice to the next level and attempting to reach websites with a large number of visitors accessing information in order to affect as many people as possible. Large websites and companies are at a higher online security risk for these types of acts.

10. Botnets

botnet is a number of computers set up to forward information (like spam and viruses) to other computers. In the past, botnets were set up to take email and password credentials, which were very useful to spammers. However, with the emergence and advancements in technology, botnets are collecting more data from computers such as name, address, age, financial information, online activity and more. They will then gather your information and sell the data to others. Personal data can be bought and sold by a number of companies and businesses, which is how spammers can obtain so many email addresses. These advanced botnets pose a considerable security risk making personal information extremely vulnerable.

Source: Utica College

Ten Ways Evolving Technology Affects Cybersecurity

STAY UP TO DATE WITH THE LATEST TECH NEWS

We like to read the latest tech news, so we post it here for you to read!

LATEST NEWS

Your battery status is being used to track you online

posted one year ago

Battery status indicators are being used to track devices, say researchers from Princeton University – meaning warnings of privacy exposure have come to pass A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online, a year after privacy researchers warned that it had the potential to do just that. The ba Read More

Top-ranked programming Web tutorials introduce vulnerabilities into software

posted one year ago

Researchers from several German universities have checked the PHP codebases of over 64,000 projects on GitHub, and found 117 vulnerabilities that they believe have been introduced through the use of code from popular but insufficiently reviewed tutorials. The process The researchers identified popular tutorials by inputing search terms such as “mysql tutorial”, “php search fo Read More

Google reportedly planning built-in ad-blocking feature for Chrome

posted one year ago

On both its mobile and desktop browsers Google plans to introduce an ad-blocking setting in both the mobile and desktop versions of its Chrome browser, according to The Wall Street Journal. The option would be opt-in, and it would remove any and all “unacceptable” ads as defined by Coalition for Better Ads industry group. Those types of ads include pop-up ads, autoplay videos, and wha Read More

10 Reasons Why Your Domains and WordPress Should Be Kept Separate

posted one year ago

There are several popular providers that offer both domains and hosting for WordPress. For over a decade, the standard advice has suggested you should forgo convenience and keep your domains and hosting separate. It makes sense to house your site in the same place where you got your domain, especially since many providers offer seamless user interfaces for managing them both and some also offer Read More

OLDER NEWS

Children as young as 13 attending 'smartphone rehab' as concerns grow over screen time

posted one year ago

Children refusing to put down their phones is a common flashpoint in many homes, with a third of British children aged 12 to 15 admitting they do not have a good balance between screen time and other activities. But in the US, the problem has become so severe for some families that children as young as 13 are being treated for digital technology addiction. One ‘smartphone rehab’ cen Read More

AI wins $290,000 in Chinese poker competition

posted one year ago

An artificial intelligence program has beaten a team of six poker players at a series of exhibition matches in China. The AI system, called Lengpudashi, won a landslide victory and $290,000 (£230,000) in the five-day competition. It is the second time this year that an AI program has beaten competitive poker players. An earlier version of the program, known as Libratus, beat four of the w Read More

Ten Ways Evolving Technology Affects Cybersecurity

posted one year ago

The ever-evolving digital age affects cybersecurity more than most people realize. The rate of cybercrimes has grown exponentially and is consistent with the growth of technology. As technology expands and develops, so do the cybercrimes that are committed. Fortunately, as technology has advanced, so has the ability to seek out cybercrimes before they happen and protect people when they Read More

Investigation finds inmates built computers and hid them in prison ceiling

posted one year ago

COLUMBUS, Ohio. The discovery of two working computers hidden in a ceiling at the Marion Correctional Institution prompted an investigation by the state into how inmates got access. In late July, 2015 staff at the prison discovered the computers hidden on a plywood board in the ceiling above a training room closet. The computers were also connected to the Ohio Department of Rehabilitation and Co Read More

Two Lines Of Code Are About To Upend A $20 Billion Industry

posted one year ago

Imagine you’re on a business trip and killing time at the airport before your next flight. You’re excited to get home because you just put in a bid on the perfect house. The market is competitive and your biggest fear is losing out because of a paperwork glitch. Suddenly, the phone rings. On the other end is the escrow agent. Sure enough, the paperwork is incomplete. For the next 25 m Read More

JOIN US ON FACEBOOK